Tagged Questions

WiFi is a layer 1 and 2 networking protocol for wireless communication between devices. It is typically used in local networks for client access, but can also be used in point-to-point network links. WPA is used to encrypt traffic.

I'm trying to configure a WiFi access point to offer a web service on the local network, without offering clients internet access. The web server has a fixed IP address (let's say 192.168.2.2) and for ...

I've read many subjects about WiFi interference but I'm still not 100% satisfied about the problem I encountered.
Well, I have my own Internet connection and my own WiFi 2.4Ghz router on channel 11 ...

I have a Toshiba CB30 Chromebook that is unable to see my home network SSID. Both Windows PCs and Android phones can both see and connect to the network fine but the Chromebook can't see it. I have ...

Well... I thought I had this all figured out... I am essentially reopening this same question I had 2 years ago (Reference: D-link DAP-2590 VLAN configuration)
I got it all figured out back then and ...

I have a question motivated by forthcoming fieldwork and, facing the riks of repetition (as the topic has somehow been discussed before), I wanted to seek some more targeted -jargon free- advice on ...

I have a custom-built Wifi "Hotspot" setup which is built like this:
Draytek Vigor 2860 router connects to the Internet (via ADSL), no
custom setup other than settings for connecting to our ISP via ...

I'm using Gnome NetworkManager and I don't want my wireless attempting to connect automatically to any network. For an individual network to which you have already attempted to connect, this is easy ...

I have an amazon server (AWS) with a security group that blocks all the ip addresses except mine.
The problem is that I use my computer through different wifi hotspots so my ip address often changes. ...

I'm looking for a way to authenticate my wireless users beyond them just knowing the wireless password. Ideally they would join the access point then get dumped to the login portal that they'd have to ...

For the sake of brevity, let's call the wireless interface used for access point (AP) to device communication "wlan0" and the interface used for sniffing in monitor mode "wlan1." In my case, wlan1 is ...

I would like to change the way that my costumers access to the internet. I would like to enable two ways for sharing my internet:
With my wireless network as public, I would like to give a
username ...

I configured a wifi access point based on OpenWRT to limit the number of clients to 4 at the same time. For that purpose I gave a limited number (4) IP addresses leaseable by DHCP. After a period of ...

I'm having an issue with 50+ laptop/desktop machines. When the user logs into the machine with a wired/wireless connection it usually takes up to 5 minutes to get past the "Welcome screen" on Windows ...

We've bought Mikrotik RB951G-2HnD in our company (about 20 - 25 clients in network) with 50 Mbps channel from the ISP-side. Mikrotik Wireless drops connection or getting very low speed often as more ...

I have a Cisco wireless setup (having controller, AAA server and access points) in my office.
I want to setup Hotspot in one of my office location ( like the Airport Hotspot solution, where you can ...

We are implementing a WiFi hotspot at a busy airport for passengers to download media from a locally connected Media Server (on the same LAN). We expect simulteanous user connections of upto max 50 ...

I had the task of managing the I.T at a Expo event my company exhibitted at. This involved (relative to this question) streaming videos from a locally hosted server (HTTP) to 8 IPads wirelessly. We ...

I've ran Wireshark multiple times on my notebook for wireless networks verifying mobile packages for my devices and it used to work most of the time.
I haven't been able to monitor my traffic today ...

What I mean by that is, when you connect to a public place's WiFi hotspot, you can log in without a password, but then you have to go to the browser and click a button to log in. Is there any reason ...

About two weeks ago we performed maintenance on our on-premise infrastructure in our office. Including applying updates to our Hyper-V-based virtual hosts, as well as our SAN. We also modified some ...

We purchased a device that acts as a WAP through which you can connect a mobile device and share its content onto a projector or tv.
My question is - if we have multiple deployments of this device, ...

I'm using hostapd to create an access point and I was wondering if there's any way for me to get an output of current or recent association attempts.
Ideally I'd like to see the MAC ID and any other ...

Is it possible to log wireless events including failed authorization attempts?
I have two access points and also would like to see, which one is serving which client and see when client is connected ...

I suspect someone is trying to hack our wireless network. I've stopped broadcasting the SSID, but assuming they've already attempted to gain access in the past they could have the BSSID stored, which ...